{"id":16871,"date":"2019-11-13T06:10:03","date_gmt":"2019-11-13T14:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/13\/news-10609\/"},"modified":"2019-11-13T06:10:03","modified_gmt":"2019-11-13T14:10:03","slug":"news-10609","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/13\/news-10609\/","title":{"rendered":"Labs report finds cyberthreats against healthcare increasing while security circles the drain"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 13 Nov 2019 13:00:00 +0000<\/strong><\/p>\n<p>The team at Malwarebytes Labs is at it again, this time with a special edition of our quarterly CTNT report\u2014<a href=\"https:\/\/resources.malwarebytes.com\/files\/2019\/11\/191028-MWB-CTNT_2019_Healthcare_FINAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Cybercrime tactics and techniques: the 2019 state of healthcare (opens in a new tab)\">Cybercrime tactics and techniques: the 2019 state of healthcare<\/a>. Over the last year, we gathered global data from our product telemetry, honeypots, threat intelligence, and research efforts, focusing on the top threat categories and families that plagued the medical industry, as well as the most common attack vectors used by cybercriminals to penetrate healthcare defenses. <\/p>\n<p style=\"text-align:left\">What we found is that healthcare-targeted cybercrime is a growing sector, with threats increasing in volume and severity while highly-valuable patient data remains unguarded. With a combination of <a rel=\"noreferrer noopener\" aria-label=\"unsecured electronic healthcare records (EHR) (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/physician-protect-thyself-healthcare-cybersecurity-circling-the-drain\/\" target=\"_blank\">unsecured electronic healthcare records (EHR)<\/a> spread over a broad attack surface, cybercriminals are cashing in on industry negligence, exploiting vulnerabilities in unpatched legacy software and social engineering unaware hospital staff into <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/03\/new-research-finds-hospitals-are-easy-targets-for-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"opening malicious emails (opens in a new tab)\">opening malicious emails<\/a>\u2014inviting infections into the very halls constructed to beat them.<\/p>\n<p>Our report explores the security challenges inherent to all healthcare organizations, from small private practices to enterprise HMOs, as well as the devastating consequences of criminal infiltration on patient care. Finally, we look ahead to <a href=\"https:\/\/blog.malwarebytes.com\/artificial-intelligence\/2019\/08\/how-brain-machine-interface-bmi-technology-could-create-internet-of-thoughts\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"innovations in biotech (opens in a new tab)\">innovations in biotech<\/a> and the need to consider security in their design and implementation.<\/p>\n<h3>Key takeaways: the 2019 state of healthcare<\/h3>\n<p>Some of the key takeaways from our report: <\/p>\n<ul>\n<li>The medical sector is currently ranked as the seventh-most targeted global industry according to Malwarebytes telemetry gathered from October 2018 through September 2019.<\/li>\n<li>Threat detections have increased for this vertical from about 14,000 healthcare-facing endpoint detections in Q2 2019 to more than 20,000 in Q3, a growth rate of 45 percent.<\/li>\n<li>The medical industry is overwhelmingly targeted by Trojan malware, which increased by 82 percent in Q3 2019 over the previous quarter. <\/li>\n<li>While Emotet detections surged at the beginning of 2019, TrickBot took over in the second half as the number one threat to healthcare today.<\/li>\n<li>The healthcare industry is a target for cybercriminals for several reasons, including their large databases of EHRs, lack of sophisticated security model, and high number of endpoints and other devices connected to the network. <\/li>\n<li>Consequences of a breach for the medical industry far outweigh any other organization, as stolen or modified patient data can put a stop to critical procedures, and devices locked out due to ransomware attack can result in halted operations\u2014and sometimes even patient death.<\/li>\n<li>New innovations in biotech, including cloud-based biometrics, genetic research, and even advances in prosthetics could broaden the attack surface on healthcare and result in far-reaching, dire outcomes if security isn&#8217;t baked into their design and implementation.<\/li>\n<\/ul>\n<p>To learn more about the cyberthreats facing healthcare and our recommendations for improving the industry&#8217;s security posture, read the full report:<\/p>\n<p style=\"text-align:center\"><strong><a href=\"https:\/\/resources.malwarebytes.com\/files\/2019\/11\/191028-MWB-CTNT_2019_Healthcare_FINAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Cybercrime tactics and techniques: the 2019 state of healthcare (opens in a new tab)\">Cybercrime tactics and techniques: the 2019 state of healthcare<\/a><\/strong><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2019\/11\/labs-report-cyberthreats-healthcare-increasing-security-circles-drain\/\">Labs report finds cyberthreats against healthcare increasing while security circles the drain<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2019\/11\/labs-report-cyberthreats-healthcare-increasing-security-circles-drain\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 13 Nov 2019 13:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/reports\/2019\/11\/labs-report-cyberthreats-healthcare-increasing-security-circles-drain\/' title='Labs report finds cyberthreats against healthcare increasing while security circles the drain'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/11\/shutterstock_1080963608.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this special edition of our quarterly CTNT report, we focus on the top attack methods and threats plaguing the healthcare industry over the last year, plus highlight recurring security challenges and reasons why cybercriminals target patient data.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/reports\/\" rel=\"category tag\">Reports<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apis\/\" rel=\"tag\">APIs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/biotech\/\" rel=\"tag\">biotech<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ehr\/\" rel=\"tag\">EHR<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electronic-health-record\/\" rel=\"tag\">electronic health record<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/health-apps\/\" rel=\"tag\">health apps<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/health-insurance-portability-and-accessibility\/\" rel=\"tag\">Health Insurance Portability and Accessibility<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/health-records\/\" rel=\"tag\">health records<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare\/\" rel=\"tag\">healthcare<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare-cybersecurity\/\" rel=\"tag\">healthcare cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare-security\/\" rel=\"tag\">healthcare security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hipaa\/\" rel=\"tag\">HIPAA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/medical-device\/\" rel=\"tag\">medical device<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/medical-device-threat\/\" rel=\"tag\">medical device threat<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/medical-management-apps\/\" rel=\"tag\">medical management apps<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-malware\/\" rel=\"tag\">trojan malware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/reports\/2019\/11\/labs-report-cyberthreats-healthcare-increasing-security-circles-drain\/' title='Labs report finds cyberthreats against healthcare increasing while security circles the drain'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2019\/11\/labs-report-cyberthreats-healthcare-increasing-security-circles-drain\/\">Labs report finds cyberthreats against healthcare increasing while security circles the drain<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23434,23435,17544,17545,15715,17546,21179,1243,5976,17547,13179,18118,14724,14725,21520,3924,1804,13256,23436],"class_list":["post-16871","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apis","tag-biotech","tag-ehr","tag-electronic-health-record","tag-emotet","tag-health-apps","tag-health-insurance-portability-and-accessibility","tag-health-records","tag-healthcare","tag-healthcare-cybersecurity","tag-healthcare-security","tag-hipaa","tag-medical-device","tag-medical-device-threat","tag-medical-management-apps","tag-phishing","tag-reports","tag-trickbot","tag-trojan-malware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16871"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16871\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16871"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}